5.9
CVE-2021-26833
- EPSS 0.32%
- Veröffentlicht 06.04.2021 16:15:16
- Zuletzt bearbeitet 21.11.2024 05:56:52
- Quelle cve@mitre.org
- CVE-Watchlists
- Unerledigt
Cleartext Storage in a File or on Disk in TimelyBills <= 1.7.0 for iOS and versions <= 1.21.115 for Android allows attacker who can locally read user's files obtain JWT tokens for user's account due to insufficient cache clearing mechanisms. A threat actor can obtain sensitive user data by decoding the tokens as JWT is signed and encoded, not encrypted.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Timelybills ≫ Timelybills SwPlatformiphone_os Version <= 1.7.0
Timelybills ≫ Timelybills SwPlatformandroid Version <= 1.21.115
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.32% | 0.516 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 5.9 | 2.2 | 3.6 |
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
|
| nvd@nist.gov | 4.3 | 8.6 | 2.9 |
AV:N/AC:M/Au:N/C:P/I:N/A:N
|
CWE-459 Incomplete Cleanup
The product does not properly "clean up" and remove temporary or supporting resources after they have been used.